Former Reddfugee, found a new home on feddit.de. Server errors made me switch to discuss.tchncs.de. Now finally @ home on feddit.org.

Likes music, tech, programming, board games and video games. Oh… and coffee, lots of coffee!

I � Unicode!

  • 0 Posts
  • 11 Comments
Joined 4 months ago
cake
Cake day: June 21st, 2024

help-circle

  • Some companies just blatantly sell your data. Others get breached and you are part of the package that gets sold by the hackers.

    The only “way around” is to use unique mail addresses for each signup/company so you can easily lock it and switch to another one when it gets known.

    Just assume, that everything that you type in a form online (or in any other way send to a company/another person digitally), every email you send, everything that gets digitized about you, etc. will be public one day. Either because the other side of the transaction sold it or because they (or you) will be hacked eventually.

    Btw: HaveIBeenPwned does not necessarily contain all breaches. I have several notifications of companies that got breached and leaked my data that are not listed in HIBP…










  • Basically it means to not have a special designed hardware for task X but to do much of it in software which gives you more flexibility. And also let’s you configure and use X a bit more flexible.

    E.g. software defined networking: If you run several virtual machines on a server, you may define the whole network between them virtually in software instead of doing it on the hardware side. Sure, you still need an ethernet card in your server to connect it to other servers and the internet, but all load balancing, switches, firewalls, VLANs, etc. between the virtual machines (or containers) on your server are virtualized in software - or maybe eben between servers.

    Same goes for e.g. Software Defined Radio. In the early days you had dedicated hardware to control the mobile network and the antennas and such. Today you “just” have the antenna and a transceiver that is capable of producing and receiving a wide range of signals and modulations. All encoding, decoding and interpretation the signals is done in software. If your hardware is capable enough, the upgrade from e.g. 4G to 5G may only be a software update for all base stations.